InfoCoBuild

Information Security 3

Information Security 3. Instructor: Prof. V. Kamakoti, Department of Computer science and Engineering, IIT Madras. This course will present you the basics of UNIX and network administration with some emphasis on security. This course is the third in the Information Security series and will cover Server and Network administration for Information security engineers. Understanding these basic concepts is a must for an engineer to appreciate advanced concepts related to Information security. (from nptel.ac.in)

Lecture 24 - Linux: File Comparison


Go to the Course Home or watch other lectures:

Fundamentals of Operating System
Lecture 01 - Operating System: Introduction
Lecture 02 - Storage Hierarchy, Exceptions, Interrupts and Traps
Lecture 03 - OS Management Services
Lecture 04 - OS Security Issues
Lecture 05 - Process and Threads
Lecture 06 - Process Scheduling
Lecture 07 - Scheduling Algorithm
Lecture 08 - Process Synchronization
Lecture 09 - Memory Management
Lecture 10 - Memory Management (cont.)
Lecture 11 - File Systems
Lecture 12 - File Systems (cont.)
Lecture 13 - Unix Filesystem
Lecture 14 - Unix Filesystem (cont.)
Introduction to Linux
Lecture 15 - Linux: Basic Commands
Lecture 16 - Linux: Basic Commands (cont.)
Lecture 17 - Linux: Users and Permissions
Lecture 18 - Linux: I/O Redirection and Pipes
Lecture 19 - Linux: Task Control
Lecture 20 - Linux: Shell Environment
Lecture 21 - Linux: Text Editors
Lecture 22 - Linux: Compression/ Archiving
Lecture 23 - Linux: Print and Sync Commands
Lecture 24 - Linux: File Comparison
Lecture 25 - Basic Networking Administration
Lecture 26 - Filesystems and Devices
Basics of Shell Programming
Lecture 27 - Shell Introduction
Lecture 28 - Shell Comments and Variables
Lecture 29 - Shell Variables
Lecture 30 - Shell Arrays and Arithmetic
Lecture 31 - Shell Condition and Relation
Lecture 32 - Shell Examples 1
Lecture 33 - Shell Functions
Lecture 34 - Shell File Test
Lecture 35 - Shell Loop Control
Lecture 36 - Shell Script Variations
Lecture 37 - Shell Pattern Matching
Lecture 38 - Shell Case Statements
Lecture 39 - Shell Co-routines
Lecture 40 - Shell Signals and Traps
Lecture 41 - Shell Subshell
Lecture 42 - Shell Declarations
Lecture 43 - Shell Examples 2
Lecture 44 - Shell Review
Networking
Lecture 45 - Basics of Networking - An Introduction
Lecture 46 - Structure of a Network
Lecture 47 - Network Core - Definition
Lecture 48 - Network Access and Physical Media
Lecture 49 - Structure of ISP and Packet Delays
Lecture 50 - Network Protocol Layers
Lecture 51 - Network Devices
Network Security
Lecture 52 - Network Security - An Introduction
Lecture 53 - Public Key Cryptography
Lecture 54 - Digital Signatures
Lecture 55 - Security in Practice
Lecture 56 - Security in Practice (cont.)
Lecture 57 - Wireshark
Lecture 58 - Snort
Lecture 59 - Review I
Lecture 60 - Review II